Zimperium: Experts of Enterprise Mobile Security Threat Defense

Follow Zimperium on :

Brian Peck, VP of Product Management

In the wake of ever-increasing security breaches, mobile security (or its lack thereof) has made its fair share of headlines. Organizations today are increasingly relying on mobile devices, both corporate-owned and bring your own device (BYOD), for improved productivity in the businesses.

More often than not, however, the inability to assess mobile vulnerabilities and identify threats is a huge factor against that reliance. Besides, amidst the fight to reinforce mobile security against the next-generation of advanced mobile cyberattacks, detecting bad networks and apps (in addition to device compromises and phishing) also becomes a huge challenge. Taking into consideration the fact that the enterprises’ existing tools such as the Mobile device management (MDM) servers are not adequate for identifying mobile threats, they need a Mobile threat defense (MTD) solution that protects their endpoints effectively.

According to the research from the company’s global threat intelligence team, zLabs, traditional endpoints, which include computing devices such as desktops and servers, account for only 40 percent of the total endpoints. The remaining 60 percent of endpoints in an enterprise are mobile—iOS and Android devices that access corporate resources daily.

To bridge this gap and provide unequaled protection for managed and unmanaged BYOD devices, Zimperium partners with Microsoft and fulfills customers’ mobile security needs. Together, the combination of Microsoft’s management and security solutions and Zimperium’s on-device mobile security is enabling organizations to manage and protect their iOS and Android devices against mobile cyber attacks.

To offer customers a solution that provides protection for personal ( BYOD) devices, Zimperium’s MTD product, zIPS, integrates with Microsoft Endpoint Manager (formerly Microsoft Intune) and offers customers conditional access to Microsoft 365 applications based on the riskiness of the devices. Zimperium not only detects and analyzes threats but also provides this intelligence to the Intune MDM solution, offering the visibility to enact risk-based policies and remediate attacks automatically. The Intune MDM solution enforces Mobile Application Management (MAM) and MTD policy, enabling the Microsoft customers to protect their MAM-enabled apps against the device, network, phishing, and malicious app attacks. Moreover, the company offers advanced integration with Microsoft Defender Advanced Threat Protection (ATP) for forensic-level threat visibility and hunting.

We are the global leader in advanced enterprise mobile security

Zimperium also is currently the only MTD solution capable of integrating with Microsoft Azure Sentinel, which enables security analysts to include mobile threat data in their advanced threat hunting and threat correlation analysis. This gives them insight into their mobile threat landscape and enhances their security operation capabilities.

Zimperium is renowned for providing the most privacy-friendly solutions alongside offering phishing protection solutions that protect users from phishing attacks. “Our mobile threat defense solution uses on-device detection and remediation of threats, so we don’t have to compromise user privacy by collecting their browsing history and sending it up to the cloud for analysis,” says Brian Peck, VP of Product Management at Zimperium. The Zimperium platform leverages its on-device machine-learning-based engine, z9, for protecting mobile data, apps, and sessions against device compromises, phishing attempts, network attacks, and malicious applications.

Zimperium is the only MTD solution developed and designed to seamlessly work on the Microsoft Azure cloud platform. One of Zimperium’s biggest differentiators is their ability to manage integrations with multiple UEM vendors in a single console view. For joint Zimperium and Microsoft customers, this capability simplifies the migration from a third-party UEM to Microsoft Endpoint Manager while maintaining security during the migration.

“We’re the only solution provider that enables customers to have a single console for the security of their devices that are connected to multiple UEM platforms and provides visibility and security across the mobile infrastructure. We have the most comprehensive integration with Microsoft, among all the different mobile threat defense companies,” explains Peck.

Having carved a unique niche for itself in the market, Zimperium aims to continue growing and expanding partnerships such as Microsoft to best serve customers’ needs. Additionally, Zimperium is a part of the Microsoft Intelligent Security Association. “We are the global leader in complete enterprise mobile security. We have a strong working relationship with Microsoft across the development and product teams as well as marketing and sales,” asserts Peck. The company will continue to focus on providing industry-leading detection and protection from the device, network, application, and phishing mobile threats. Zimperium strives to stay at the forefront in leadership in mobile threat detection, now and for the future.

Description The company is a global industry leader in enterprise mobile threat defense (MTD) and the only provider of on-device, continuous, and real-time protection against both known as well as unknown threats. To offer customers a jointly developed solution that provides device-risk based app protection for personal (BYOD) devices, Zimperium’s mobile threat defense (MTD) integrates with Microsoft Endpoint Manager (formerly Microsoft Intune). It offers customers conditional access to Microsoft 365 applications based on Intune app protection policies. Moreover, the company provides advanced integration with Microsoft Defender Advanced Threat Protection (ATP) for forensic-level threat visibility and hunting. Zimperium is also the only MTD solution that is integrated with Microsoft Azure Sentinel, which enables security analysts to include mobile threat data in their advanced threat hunting and threat correlation analysis

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info